The Art Of War And ECommerce Essay — страница 8

  • Просмотров 416
  • Скачиваний 4
  • Размер файла 27

look for unusual or suspicious activity. Backup Data. Don’t be a victim of accidental or malicious data erasure. Backup all sensitive data on a regular basis. Purchase and Deploy Anti-Virus Software. Computer viruses can spread throughout a system in minutes. Check systems for viruses on a regular basis. Change Passwords On A Regular Rotational Basis. Don’t pick easy to remember passwords and change them often. Consider the use of one-time password tokens to avoid password compromise threats. Deploy Vendor Security Patches. Consult with vendors and obtain any system security patches that can be used to add additional layers of protection. Establish and Enforce A Security Policy. Develop and enforce a company-wide computer and physical security policy. Employee Awareness.

Ensure all employees and management are briefed regularly on security threats, policies, corrective measures and incident reporting procedures. Make Use Of Public Domain Security Tools. A wide variety of public domain security tools exist on the Internet, many of which can be used to assist in the protection of computer systems. Adams, Jon-K. Hacker Ideology (aka Hacking Freedom). 2 August 1998. Culp, Scott. The Ten Immutable Laws of Security. . 23 October 2000. Johnston, Margaret and Joris Evers. FBI warns e-commerce sites. Copyright (c) 2000 by InfoWorld Media Group, Inc., a subsidiary of IDG Communications, Inc. 9 March 2001. Knight, Will. Political hackers are modern freedom fighters. ZDNet UK.,2000013063,20208096,00.htm . 9 March 2001. MCI’s Internet Security Department. How to Hacker-Proof Your Computer Systems. 28 December 1995. Mizrach, Steve. Is there a Hacker Ethic for 90s Hackers? Infowar.Com & Interpact, Inc. . 12 March 2001. Sullivan, Bob. Big Brother is watching. 30 October 2000. Sullivan, Bob. No genius needed to hack bad system. . 20 March 2001.